DETECTION AND PREVENTION OF CYBER ATTACKS USING ARTIFICIAL INTELLIGENCE
DOI:
https://doi.org/10.47390/SPR1342V6I3Y2026N41Keywords:
AI systems, cybercrime, Internet fraud, personal data, cyberattacks, hacking, virus, malicious programs.Abstract
The threat of cybercrime in the digital space is becoming increasingly complex. This article examines the risks encountered in cyberspace from a theoretical and practical point of view: analyzes the risks identified by malware, fake web resources, data theft through social manipulation, and comprehensive monitoring of user behavior. The main focus is on using artificial intelligence (AI) to identify these risks earlier, take into account the contextual factors of user activity and improve security measures. The article covers the following directions: detection of anomalous events through SI methods, profiling by studying user behavior, real-time analysis of danger signals and optimization of warning processes, strengthening of system security based on multilayer security architecture, creation of customized notifications and educational materials to increase user awareness. The article also discusses the risk aspects of SI systems, the limitations of identification and authentication, as well as the importance of security policies. These methods are important in crime detection and prevention. At the same time, legislative proposals have been submitted to improve the current situation, prevent cybercrimes and assign responsibility for them.
References
1. Borodkina T.N., Pavlyuk A.V. Kiberprestupleniya: ponyatiye, soderzhaniye i mery protivodeystviya [Cybercrime: concept, content and countermeasures]. Social and political sciences, 2018, vol. 1, pp. 135–137.
2. Russell SJ, Norvig P. Artificial Intelligence: A Modern Approach. Upper Saddle River, New Jersey: Prentice Hall; 2009. [Google Scholar]
3. Roger C. Schank.Where's the AI. AI Magazine. 1991;12:38. [Google Scholar]
4. Jerry K. Artificial Intelligence – what everyone needs to know. New York: Oxford University Press; 2016. [Google Scholar]
5. Nilsson JN. Principles of artificial intelligence. Palo California: Morgan Kaufmann Publishers; 1980. [Google Scholar]
6. Nils N. Artificial Intelligence: A New Synthesis. Morgan Kaufmann; 1998. [Google Scholar]
7. Dina B. “Microsoft develops AI to help cancer doctors find the right treatment” in Bloomberg News. 2016 [Google Scholar]
8. Toraxodjaeva I. O‘zbekistonda Internet tarmog‘i orqali sodir etiladigan jinoyatchilikka qarshi kurash muammolari [Problems of combating crime committed through the Internet in Uzbekistan]. Tashkent, Review of law sciences, 2019, vol. 03, pp. 128–132.
9. Kochkina L. Definition of the concept “cybercrime”. Selected types of cybercrime. Sibirskie ugolovnoprotsessualnye i kriminalisticheskie chteniya, 2017, vol. 3 (17), p. 37-40.
10. Technology Briefing Internet: S.E.C. Issues Warning On Fraud. Available at: https://www.nytimes.com/2002/06/26/business/technology-briefing-internet-sec issues-warning-on-fraud. 2022, p.89-100.
11. Sherri G. Cyberstalking: Definition, Signs, Examples, and Prevention, 2023. Available at https://www.verywellmind.com/what-is-cyberstalking-5181466. 2020.p, Tashkent, ILM ZIYO Publ., 2011. p, 34-40.
12. Ro‘ziev R.N., Salaev N.S. Kiberjinoyatchilikka qarshi kurashishga oid milliy va xalqaro standartlar [National and international standards for combating cybercrime]. Tashkent, TSUL Publ., 2018, p, 133-140.
13. Delcker J. Politico Europe's artificial intelligence correspondent told DW News in DW News on Black Box of Artificial Intelligence. 2018. [Last accessed on 2019 Nov 18]. Available from https://mdwcom/en/can-ai-be-free-of-bias/a-43910804 .
14. European Commission on Ethical Guidelines for Trustworthy AI. The High-Level Expert Group on AI presented this guideline which stated three requirements: lawful, ethical and robust [Google Scholar]
15. Nick B, Yudkowsky E. The Ethics of Artificial Intelligence. In: Keith Frankish, William Ramsey., editors. Cambridge Handbook of Artificial Intelligence. New York: Cambridge University Press; 2014. [Google Scholar]





